CVE-2026-2743
Description
Arbitrary File Write via Path Traversal upload to Remote Code Execution in SeppMail User Web Interface. The affected feature is the large file transfer (LFT).
This issue affects SeppMail: 15.0.2.1 and before
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A path traversal vulnerability in SeppMail's Large File Transfer component allows authenticated attackers to achieve remote code execution by overwriting /etc/syslog.conf.
Root
Cause
The Large File Transfer (LFT) component in SeppMail's User Web Interface suffers from a path traversal vulnerability during file upload. The application fails to properly sanitize user-supplied filenames, enabling an attacker to write arbitrary files to the filesystem. Specifically, the configuration file /etc/syslog.conf can be overwritten with malicious content, which is then executed by the syslog daemon, leading to remote code execution [2].
Exploitation
An attacker must first obtain an authenticated session. However, SeppMail enables self-registration by default, making it trivial to create a legitimate user account without any prior authorization. Once authenticated, the attacker can upload a crafted file via the LFT endpoint, using path traversal sequences (e.g., ../etc/syslog.conf) to target the syslog configuration. The uploaded file contains shell commands that are executed when syslog processes logs, resulting in command execution with root privileges [2].
Impact
Successful exploitation grants the attacker full remote code execution on the SeppMail gateway as root. This allows complete compromise of the appliance, including access to all emails, user data, and network communications. The vulnerability affects SeppMail versions 15.0.2.1 and earlier [2].
Mitigation
The issue has been addressed in SeppMail version 15.0.4. Users are strongly advised to upgrade to the latest release to mitigate the risk. No workaround is currently available [2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- SeppMail/SeppMailv5Range: unknown
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
1- SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic AccessThe Hacker News · May 19, 2026